Cyber+ Suite

Global Reach, Local Support

Empowering Businesses through IT & Comms Solutions Excellence…

Cyber+ Suite

Our ‘Enterprise’ and ‘Pro’ Managed IT Solutions ensure that users are provided with a guaranteed level of support, as well as providing 24/7 Monitoring and protection for your systems and data, including a range of features, ensuring the right fit for your business.

But for a comprehensive Cyber Security solution, adding our Cyber+ Suite to your Managed IT service provides you with the confidence that your business, your data and your users are in safe hands…

Award Winning Managed IT Solutions for SMEs
Award Winning Managed IT Solutions for SMEs

Our Cyber+ Suite, as an add-on to our Managed IT services, includes the following protection features…

24/7 SOC
Our Security Operations Centre (SOC) operates 24/7, monitoring and analysing your network to identify potential security incidents in real-time. This constant vigilance provides peace of mind, as expert analysts are on hand to investigate, respond, and mitigate threats, ensuring continuous protection for your network and minimising the risk of a security breach.

Managed Detect & Response
Managed Detect & Response (MDR) combines proactive threat detection with expert response. Through continuous monitoring, analysis, and rapid reaction to threats, MDR stops attacks before they can disrupt your business. Our team provides insight and support to address incidents effectively, making sure threats are neutralised quickly and efficiently.

PCI DSS, NIST, & HIPAA Compliance
We simplify compliance with standards like PCI DSS, NIST, and HIPAA, helping you protect sensitive information and meet regulatory requirements. By implementing best practices and regular audits, our service mitigates risks associated with data handling, reduces the likelihood of fines, and strengthens trust with clients by demonstrating strong security protocols.

Endpoint Protection
Our Endpoint Protection solution safeguards all devices within your network, from desktops to mobile devices, blocking malware, ransomware, and unauthorised access. By monitoring and managing each endpoint, we stop cyber threats at the source, ensuring comprehensive security across your IT infrastructure and maintaining seamless protection for all users.

Network Protection
With robust network protection, we secure your entire network, preventing unauthorised access and monitoring traffic for suspicious behaviour. This includes advanced intrusion detection and automated threat response, creating a secure foundation that prevents breaches, protects data, and allows you to operate confidently across all connected systems and locations.

Traffic Perimeter
Our Traffic Perimeter service inspects all data flowing into and out of your network, identifying and blocking potential threats. By managing data flow and securing your network’s boundaries, this layer of security ensures that harmful traffic is filtered out, significantly reducing the risk of cyber threats breaching your network defences.

Malware / IoCs
We actively scan for Indicators of Compromise (IoCs) linked to malware, identifying malicious activity before it impacts your business. By focusing on these early warning signs, we provide targeted countermeasures to prevent malware from spreading, minimising its impact and protecting your organisation from widespread damage.

Fileless Attacks
Fileless attacks bypass traditional antivirus measures by operating directly in memory, making them challenging to detect. Our defence system is equipped to identify these advanced threats by monitoring behavioural patterns and memory activity, ensuring comprehensive protection against attacks that could otherwise evade conventional security solutions.

Behavioural Anomalies
Using behavioural analytics, we detect unusual activities and deviations from typical patterns across users and devices, which may signal potential cyber threats. This early-warning approach identifies threats before they escalate, allowing rapid response to compromised accounts or devices and maintaining security for your organisation.

Machine Learning
Our Machine Learning-driven defences analyse patterns and learn from new data, evolving with the cyber threat landscape. This self-improving model enhances the detection of emerging threats, adapting its defences to prevent novel attacks, and ensuring ongoing protection as cyber threats continue to grow in sophistication.

Endpoint Isolation
In the event of a breach, Endpoint Isolation swiftly quarantines affected devices, cutting off network access to prevent malware from spreading. This capability minimises potential damage and disruption, allowing other devices and users to continue operating while the isolated endpoint is cleaned and restored to security compliance.

Endpoint Blocking
Proactively blocking suspicious endpoints is a vital layer of protection, preventing potentially compromised devices from accessing your network. By intercepting malicious endpoints early, we reduce the risk of data breaches, limit unauthorised access, and help ensure a secure environment for all connected users and devices.

Traffic Blocking
Traffic Blocking instantly stops any suspicious data transfers within your network. This layer of defence prevents unauthorised data access and exfiltration, ensuring that your sensitive information remains secure, while also alerting your IT team to any unusual data flows for further investigation.

Dark Web Monitoring
Our Dark Web Monitoring service scans the dark web for compromised credentials, data, and other sensitive information linked to your organisation. By identifying these threats early, we can alert you to potential risks, enabling swift action to secure your accounts and prevent cybercriminals from exploiting compromised data.

Threat Intelligence Feed
Our Threat Intelligence Feed provides real-time updates on the latest threats, sourced from a global network of cybersecurity experts. This intelligence keeps our defence strategies ahead of attackers, allowing us to update your protections based on the latest threat trends, from ransomware to phishing tactics.

Managed Deception Technology
Managed Deception Technology deploys decoys and traps throughout your network, confusing attackers and drawing them away from sensitive data. By providing false targets, we detect potential intrusions early, stopping attacks before they reach critical systems and gathering intelligence to improve your network’s resilience.

Customer MDR Portal
The Customer MDR Portal offers direct access to real-time threat insights and security updates, providing a transparent view of ongoing protections and responses. With a user-friendly dashboard, you can track the status of security incidents, monitor threat intelligence, and stay informed about your network’s security posture.

Compliance Insights
Our Compliance Insights service provides ongoing evaluations of your compliance status across relevant standards, ensuring that your organisation remains audit-ready. By regularly tracking adherence to key frameworks, we reduce compliance risks, simplify audits, and help you demonstrate a strong commitment to data protection.

Cyber Essentials (Optional)
Achieving Cyber Essentials certification demonstrates a commitment to cybersecurity, protecting against the most common cyber threats. Our optional support helps you meet the Cyber Essentials requirements, strengthening your overall security posture and enhancing client confidence in your data handling practices.

What to Expect

Our ‘Enterprise’ Managed IT Solution ensures that Users are provided with a guaranteed level of support, as well as providing 24/7 Monitoring and protection for your systems and data, with our Pro, Essentials and StarterCare solutions also offering a range of features, ensuring the right fit for your business – and depending on your requirements, you can complement your Managed IT service with our Add-Ons.

Enterprise – Managed IT

Pro – Managed IT

Essentials – Managed IT

There’s no such thing as too much support – but if Managed IT is new to you, or you’re looking for a more streamlined option, our StarterCare plan is a great place to begin. Designed for microbusinesses or those just starting their IT journey, our StarterCare plan gives you access to our award-winning IT support and a 24/7 Online Service Desk – all at an accessible price point.

While remote support is included, it’s intended for light-touch environments and subject to fair use. For more frequent or advanced support needs, our Essentials plan includes unlimited remote assistance, faster SLAs, and a more proactive service experience.

Take a look at what StarterCare includes below, and also our Cloud Suites and Cyber Suite Add-Ons.

StarterCare – Managed IT

Cloud Suite ’25 (add-on)

Cloud+ Suite ’25 (add-on)

Cyber+ Suite ’25 (add-on)

Which bundle/Microsoft Plan is the best fit for your organisation? It really depends on your specific needs and priorities, but here are some factors to consider when making your decision:

Company size: If your organisation has between 10 and 300 users and requires a comprehensive productivity suite with built-in security and device management features, Business Premium (included as part of our Cloud+ Suite) is likely the better option. However, if you have more than 300 users or anticipate rapid growth, M365 E3 / E5 may be a better fit (as an upgrade to our Cloud+ Suite). 

If you have less than 10 users and are not overly concerned about management features, our Cloud Suite (including Microsoft 365 Standard) should be adequate – and you always have the option of upgrading to our Cloud+ Suite if your requirements change…

Security and compliance needs: If your organisation has strict compliance requirements or needs advanced security features, Business Premium has a strong set of tools included, but E3 provides a more viable upgrade path to E5 security and compliance.

Budget: Business Premium is generally more affordable than E3, making it an attractive choice for cost-conscious SMBs. However, its worth checking the benefits of M365 E3’s advanced features against the additional cost to determine the best value for your organisation.

Per User Licensing & Device Policy

  • All plans are priced per registered user and include support for one primary device (e.g. a workstation or laptop).
  • Additional devices (e.g. a laptop and a workstation) can be added for a supplementary charge.
  • All users, devices, and computers within the organisation — including contractors using company-provided hardware or software — must be included in your plan.
  • All users within the same organisation must be subscribed to the same plan tier.
  • Hot Desks are treated as a single device per registered user. No discounts apply for users sharing a workstation.

 

Project Work & Exclusions

Support coverage includes day-to-day reactive and proactive assistance for users and supported devices, such as resolving faults, maintaining systems, and ensuring general IT health. However, support does not cover project-based work, including (but not limited to):

  • New workstation setups or user onboarding
  • Client-initiated software rollouts or upgrades
  • Infrastructure changes (e.g. server, firewall, or network installs)
  • Office moves or reconfigurations
  • Major system migrations or integrations

These services are treated as separate, billable projects, unless explicitly included under a Service Day allowance or quoted separately in writing.

 

Microsoft 365 Support & Licensing

  • Businesses using Microsoft 365 Business services (including Exchange, SharePoint, OneDrive, Entra, and Office apps) will incur a £6/month ‘Microsoft 365 Admin Support’ fee per registered user.
  • This fee is waived if ‘Managed’ Microsoft 365 licences are purchased through ITCS Global, either individually or via our Cloud Suites.

 

Cloud & Cyber Suite Compatibility

  • The Cloud Suite add-on is available with Essentials, Pro, and Enterprise plans.
  • Cloud+ Suite and Cyber+ Suite are only available with Pro and Enterprise plans.
  • Clients enrolled in any Suite (Cloud, Cloud+, or Cyber+) will be automatically upgraded to the latest version (e.g. from Cloud+ Suite ‘24 to Cloud+ Suite ‘25) when it is released.
  • This upgrade may occur during your existing contract and may result in additional charges due to new features or licensing updates.

 

Fair Usage Policy & Custom Solution Surcharge

  • All “unlimited support” is subject to a Fair Usage Policy:
  • A Custom Solution Surcharge may apply for clients who:
  • Have unusually complex infrastructures,
  • Consistently require above-average user support, or
  • Experience repeated security incidents due to not implementing recommended security solutions, resulting in a low Risk Mitigation Score (reviewed quarterly).
  • Note: Over 95% of customers are NOT affected by this surcharge.

 

Onsite Support Terms

  • Plans that include onsite support are limited to 1 incident per week per 10 users.
  • Additional onsite support (including “Discounted Onsite Support”) is billed at 50% of standard onsite rates.
  • For onsite visits within Central London, a £20/hour surcharge applies.
  • Workstation installations (e.g. for new users or hardware upgrades) are treated as billable projects, unless carried out under accrued Service Days.

 

Service Days (Enterprise Plan Only)

  • Service Days accrue at a rate of 0.5 days per 10 users per month, capped at 1 day per week.
  • Unused Service Days do not carry over from month to month.

 

SLA Hours & Response Times

  • Plan Tier Business Hours
    Standard Mon–Fri, 9:00am – 5:00pm
    Pro Mon–Fri, 8:00am – 6:00pm
    Enterprise Mon–Sat, 8:00am – 8:00pm
  • Phone Response and Ticket SLA times are estimated and based on historical service data from January 2024 to October 2024. These are not guaranteed.

 

StarterCare Plan Specifics

  • StarterCare is only available to new customers.
  • It is limited to small/micro businesses (up to 9 users).
  • Existing customers are not eligible to downgrade to StarterCare.
  • RMM monitoring under StarterCare focuses on essential system health indicators, with a reduced number of checks compared to our Essentials, Pro, and Enterprise plans.
  • Remote support under the StarterCare plan limited, capped at a maximum of 2 remote support incidents per user, per calendar month. Additional incidents may be billed at our standard hourly support rate or may require an upgrade to a higher support tier.

 

Contract Terms, Renewals & Onboarding

  • All Managed IT & Support Plans have a minimum initial term of 12 months, and are billed monthly in advance of the covered month.
  • Contracts automatically renew on their anniversary date:
  • Essentials, Pro, and Enterprise Plans renew on a rolling 3-month minimum term, unless cancelled with notice.
  • StarterCare Plans renew for a full 12-month term, unless cancelled prior to the renewal date.
  • Each Managed IT & Support Plan carries a minimum monthly billing commitment equivalent to 5 registered users, irrespective of the number of users onboarded
  • Add-ons that include annual-commitment licences (e.g. Microsoft 365) remain active until the licence period ends.
  • If a support plan is cancelled before these licences expire, they will be billed at our standard standalone rates for the remaining term.
  • An onboarding fee is applicable for all Managed IT Plans and Cloud Suites, charged at a rate equivalent to the full monthly subscription cost (per user/device), and is payable in advance. Any required onsite onboarding for StarterCare or Essentials plans will be billed separately at standard onsite rates, in addition to the standard onboarding fee.

 

Price Adjustments

  • ITCS Global reserves the right to apply a standardised annual price increase of up to 15%, typically between January and March.
  • This increase is not linked to your contract anniversary.
  • New clients are exempt from any price rise during their first 12 months.

 

Terms and Conditions are subject to change without notice. Please contact us if you have any questions regarding the above.